Inner and outer approximation of capture basin using interval analysis

Similar documents
Distributed localization and control of underwater robots

On sufficient conditions of the injectivity : development of a numerical test algorithm via interval analysis

Determination of Inner and Outer Bounds of Reachable Sets

The Convex Hull of a Space Curve. Bernd Sturmfels, UC Berkeley (two papers with Kristian Ranestad)

Unconstrained Optimization

Contents. 3 Multiple Integration. 3.1 Double Integrals in Rectangular Coordinates

A new approach for computing with fuzzy sets using interval analysis

J. Weston, A. Gammerman, M. Stitson, V. Vapnik, V. Vovk, C. Watkins. Technical Report. February 5, 1998

Nonlinear Bounded-Error Parameter Estimation Using Interval Computation

Applied Interval Analysis

Three Dimensional CORDIC with reduced iterations

Math 113 Exam 1 Practice

There have been many wide-ranging applications of hybrid dynamic systems, most notably in manufacturing systems and network protocols. To date, they h

PATH PLANNING USING INTERVALS AND GRAPHS

The Global Standard for Mobility (GSM) (see, e.g., [6], [4], [5]) yields a

Chapter 3. Quadric hypersurfaces. 3.1 Quadric hypersurfaces Denition.

The Convex Hull of a Space Curve

5. y 2 + z 2 + 4z = 0 correct. 6. z 2 + x 2 + 2x = a b = 4 π

Notice that the height of each rectangle is and the width of each rectangle is.

Linear algebra deals with matrixes: two-dimensional arrays of values. Here s a matrix: [ x + 5y + 7z 9x + 3y + 11z

Conics, Parametric Equations, and Polar Coordinates. Copyright Cengage Learning. All rights reserved.

ROC-HJ: Reachability analysis and Optimal Control problems - Hamilton-Jacobi equations

However, m pq is just an approximation of M pq. As it was pointed out by Lin [2], more precise approximation can be obtained by exact integration of t

Polar Coordinates. OpenStax. 1 Dening Polar Coordinates

Guaranteed detection of the singularities of 3R robotic manipulators

Polar Coordinates. Calculus 2 Lia Vas. If P = (x, y) is a point in the xy-plane and O denotes the origin, let

Coordinate Transformations in Advanced Calculus

Polynomials. Math 4800/6080 Project Course

APPLICATION OF THE FUZZY MIN-MAX NEURAL NETWORK CLASSIFIER TO PROBLEMS WITH CONTINUOUS AND DISCRETE ATTRIBUTES

Interval Analysis for Guaranteed Set Estimation

MATH 2400, Analytic Geometry and Calculus 3

Lab 2: Support Vector Machines

Volumes of Solids of Revolution Lecture #6 a

[Ch 6] Set Theory. 1. Basic Concepts and Definitions. 400 lecture note #4. 1) Basics

COMP30019 Graphics and Interaction Transformation geometry and homogeneous coordinates

2 ZARKO BIZACA AND JOHN ETNYRE innitely many smooth structures. Our construction of these smooth structures is based on Gompf's [G1] end-sums with exo

Double Integrals over Polar Coordinate

Issues with Curve Detection Grouping (e.g., the Canny hysteresis thresholding procedure) Model tting They can be performed sequentially or simultaneou

Forward inner-approximated reachability of non-linear continuous systems

Computing the Pessimism of Inclusion Functions

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem

Exam 3 SCORE. MA 114 Exam 3 Spring Section and/or TA:

Limits and Continuity: section 12.2

On the positive semidenite polytope rank

10.2 Calculus with Parametric Curves

Tilings of the Euclidean plane

Calculus III. Math 233 Spring In-term exam April 11th. Suggested solutions

2. Mathematical Notation Our mathematical notation follows Dijkstra [5]. Quantication over a dummy variable x is written (Q x : R:x : P:x). Q is the q

Program analysis for determining opportunities for optimization: 2. analysis: dataow Organization 1. What kind of optimizations are useful? lattice al

Section 5 Convex Optimisation 1. W. Dai (IC) EE4.66 Data Proc. Convex Optimisation page 5-1

Conics, Parametric Equations, and Polar Coordinates. Copyright Cengage Learning. All rights reserved.

Kinematics of Wheeled Robots

Analysis of Euler Angles in a Simple Two-Axis Gimbals Set

Relational Model, Relational Algebra, and SQL

to be known. Let i be the leg lengths (the distance between A i and B i ), X a 6-dimensional vector dening the pose of the end-eector: the three rst c

Graphics and Interaction Transformation geometry and homogeneous coordinates

Ray shooting from convex ranges

Lecture 1. Dr John Armstrong. April 1, 2019

Topology problem set Integration workshop 2010

MASTER Mathématiques et Applications

Supplementary Material: The Rotation Matrix

THE FREUDENTHAL-HOPF THEOREM

Global Optimization based on Contractor Programming: an Overview of the IBEX library

Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1

(a) (b) Figure 1: Bipartite digraph (a) and solution to its edge-connectivity incrementation problem (b). A directed line represents an edge that has

Rational Trigonometry Applied to Robotics

Math 259 Winter Unit Test 1 Review Problems Set B

Introduction to Parameterized Complexity

Avoiding Fake Boundaries in Set Interval Computing

Stability Analysis of the Muscl Method on General Unstructured Grids for Applications to Compressible Fluid Flow

COMP30019 Graphics and Interaction Three-dimensional transformation geometry and perspective

AQA GCSE Further Maths Topic Areas

The temporal explorer who returns to the base 1

MATH 417 Homework 8 Instructor: D. Cabrera Due August 4. e i(2z) (z 2 +1) 2 C R. z 1 C 1. 2 (z 2 + 1) dz 2. φ(z) = ei(2z) (z i) 2

Planning & Decision-making in Robotics Case Study: Planning for Autonomous Driving

Intersection of sets *

DRAFT Intervals. The set of mathematical intervals in R, denoted IR, comprises 1 all closed intervals of real numbers

Efficient implementation of interval matrix multiplication

Parametric and Polar Curves

Parallel Rewriting of Graphs through the. Pullback Approach. Michel Bauderon 1. Laboratoire Bordelais de Recherche en Informatique

An Introduction to Numerical Analysis

Convex sets and convex functions

A Random Variable Shape Parameter Strategy for Radial Basis Function Approximation Methods

Prewitt. Gradient. Image. Op. Merging of Small Regions. Curve Approximation. and

.Math 0450 Honors intro to analysis Spring, 2009 Notes #4 corrected (as of Monday evening, 1/12) some changes on page 6, as in .

Algebraic Constructions of Ecient Broadcast Networks. Michael J. Dinneen and Michael R. Fellows. University of Victoria.

State Estimation for Continuous-Time Systems with Perspective Outputs from Discrete Noisy Time-Delayed Measurements

Chapter 10 Homework: Parametric Equations and Polar Coordinates

Grad operator, triple and line integrals. Notice: this material must not be used as a substitute for attending the lectures

MAT 271 Recitation. MAT 271 Recitation. Sections 10.1,10.2. Lindsey K. Gamard, ASU SoMSS. 22 November 2013

Math 734 Aug 22, Differential Geometry Fall 2002, USC

Natasha S. Sharma, PhD

Homogeneous coordinates, lines, screws and twists

Tiling an interval of the discrete line

2 A topological interlude

Exercise 3: ROC curves, image retrieval

Convex sets and convex functions

Lab 2B Parametrizing Surfaces Math 2374 University of Minnesota Questions to:

Flow simulation. Frank Lohmeyer, Oliver Vornberger. University of Osnabruck, D Osnabruck.

Background for Surface Integration

Transcription:

Inner and outer approximation of capture basin using interval analysis M. Lhommeau 1 L. Jaulin 2 L. Hardouin 1 1 Laboratoire d'ingénierie des Systèmes Automatisés ISTIA - Université d'angers 62, av. Notre Dame du Lac, 49000 Angers, France 2 E 3 I 2 ENSIETA 2 rue Françoise Verny, 29806 Brest, France International Conference on Informatics in Control, Automation and Robotics, 2007

Motivation Let us consider the following dynamical system : where Flow function ẋ(t) = f(t, x(t), u(t)) (1) state vector x(t) is not allowed to exit a given compact set U R n ; control vector u(t) should belong to a given compact set U R m ; f C 1 (R R n R m, R n ). φ t (x 0, u) is the solution of (1) for the initial vector x 0 and for the input function u. φ [t 1,t 2 ] (x The 0, u) path def = { from x tr n 1 to, t t 2 is[t dened 1, t 2 ], x by = φ t (x 0, u) }.

Motivation Let us consider the following dynamical system : where Flow function ẋ(t) = f(t, x(t), u(t)) (1) state vector x(t) is not allowed to exit a given compact set U R n ; control vector u(t) should belong to a given compact set U R m ; f C 1 (R R n R m, R n ). φ t (x 0, u) is the solution of (1) for the initial vector x 0 and for the input function u. φ [t 1,t 2 ] (x The 0, u) path def = { from x tr n 1 to, t t 2 is[t dened 1, t 2 ], x by = φ t (x 0, u) }.

Motivation Let us consider the following dynamical system : where Flow function ẋ(t) = f(t, x(t), u(t)) (1) state vector x(t) is not allowed to exit a given compact set U R n ; control vector u(t) should belong to a given compact set U R m ; f C 1 (R R n R m, R n ). φ t (x 0, u) is the solution of (1) for the initial vector x 0 and for the input function u. φ [t 1,t 2 ] (x The 0, u) path def = { from x tr n 1 to, t t 2 is[t dened 1, t 2 ], x by = φ t (x 0, u) }.

Motivation Let us consider the following dynamical system : where Flow function ẋ(t) = f(t, x(t), u(t)) (1) state vector x(t) is not allowed to exit a given compact set U R n ; control vector u(t) should belong to a given compact set U R m ; f C 1 (R R n R m, R n ). φ t (x 0, u) is the solution of (1) for the initial vector x 0 and for the input function u. φ [t 1,t 2 ] (x The 0, u) path def = { from x tr n 1 to, t t 2 is[t dened 1, t 2 ], x by = φ t (x 0, u) }.

Motivation Let us consider the following dynamical system : where Flow function ẋ(t) = f(t, x(t), u(t)) (1) state vector x(t) is not allowed to exit a given compact set U R n ; control vector u(t) should belong to a given compact set U R m ; f C 1 (R R n R m, R n ). φ t (x 0, u) is the solution of (1) for the initial vector x 0 and for the input function u. The path from t 1 to t 2 is dened by φ [t 1,t 2 ] (x 0, u) def = { x R n, t [t 1, t 2 ], x = φ t (x 0, u) }.

Capture Basin The capture basin of a target T in K R n is the set of points C of K such that there exist a trajectory starting at C reaching T in nite time. Objective The aim of the paper is to provide an algorithm able to compute an inner and an outer approximation of set C def = { x 0 K, t 0, u, φ t (x 0, u) T and φ [0,t] (x 0, u) K }, i.e., to nd two subsets C and C + such that C C C +.

Capture Basin The capture basin of a target T in K R n is the set of points C of K such that there exist a trajectory starting at C reaching T in nite time. Objective The aim of the paper is to provide an algorithm able to compute an inner and an outer approximation of set C def = { x 0 K, t 0, u, φ t (x 0, u) T and φ [0,t] (x 0, u) K }, i.e., to nd two subsets C and C + such that C C C +.

Capture Basin The capture basin of a target T in K R n is the set of points C of K such that there exist a trajectory starting at C reaching T in nite time. Objective The aim of the paper is to provide an algorithm able to compute an inner and an outer approximation of set C def = { x 0 K, t 0, u, φ t (x 0, u) T and φ [0,t] (x 0, u) K }, i.e., to nd two subsets C and C + such that C C C +.

Capture Basin The capture basin of a target T in K R n is the set of points C of K such that there exist a trajectory starting at C reaching T in nite time. Objective The aim of the paper is to provide an algorithm able to compute an inner and an outer approximation of set C def = { x 0 K, t 0, u, φ t (x 0, u) T and φ [0,t] (x 0, u) K }, i.e., to nd two subsets C and C + such that C C C +.

Denitions Interval [x] = {x R x x x} Width w ([x]) = x x Midpoint mid ([x]) = x + x 2 Intervals have a dual nature : sets set-theoretic operations apply pairs of real-numbers an arithmetic can be built

Denitions Interval [x] = {x R x x x} Width w ([x]) = x x Midpoint mid ([x]) = x + x 2 Intervals have a dual nature : sets set-theoretic operations apply pairs of real-numbers an arithmetic can be built

Denitions Interval [x] = {x R x x x} Width w ([x]) = x x Midpoint mid ([x]) = x + x 2 Intervals have a dual nature : sets set-theoretic operations apply pairs of real-numbers an arithmetic can be built

Denitions Interval [x] = {x R x x x} Width w ([x]) = x x Midpoint mid ([x]) = x + x 2 Intervals have a dual nature : sets set-theoretic operations apply pairs of real-numbers an arithmetic can be built

Operations on intervals [x] + [y] = [ x + y, x + y ] [x] [y] = [ x y, x + y ] [x] [y] = [ min ( x, y, xy, xy, xy ), max ( x, y, xy, xy, xy )] If 0 [y] then [x] / [y] = [x] [ 1/y, 1/y ] Specic formulas available for division by interval containing zero.

Operations on intervals [x] + [y] = [ x + y, x + y ] [x] [y] = [ x y, x + y ] [x] [y] = [ min ( x, y, xy, xy, xy ), max ( x, y, xy, xy, xy )] If 0 [y] then [x] / [y] = [x] [ 1/y, 1/y ] Specic formulas available for division by interval containing zero.

Interval counterpart [f] of f from R to R satises [f] ([x]) = [{f(x) x [x]}]. For any continuous function [f] ([x]) is the image set f ([x]). Elementary interval functions are expressed in terms of bounds For instance [exp] ([x]) = [exp(x), exp(x)] Specic algorithms for trigonometric functions hyperbolic functions

Interval counterpart [f] of f from R to R satises [f] ([x]) = [{f(x) x [x]}]. For any continuous function [f] ([x]) is the image set f ([x]). Elementary interval functions are expressed in terms of bounds For instance [exp] ([x]) = [exp(x), exp(x)] Specic algorithms for trigonometric functions hyperbolic functions

Interval counterpart [f] of f from R to R satises [f] ([x]) = [{f(x) x [x]}]. For any continuous function [f] ([x]) is the image set f ([x]). Elementary interval functions are expressed in terms of bounds For instance [exp] ([x]) = [exp(x), exp(x)] Specic algorithms for trigonometric functions hyperbolic functions

Interval counterpart [f] of f from R to R satises [f] ([x]) = [{f(x) x [x]}]. For any continuous function [f] ([x]) is the image set f ([x]). Elementary interval functions are expressed in terms of bounds For instance [exp] ([x]) = [exp(x), exp(x)] Specic algorithms for trigonometric functions hyperbolic functions

Interval counterpart [f] of f from R to R satises [f] ([x]) = [{f(x) x [x]}]. For any continuous function [f] ([x]) is the image set f ([x]). Elementary interval functions are expressed in terms of bounds For instance [exp] ([x]) = [exp(x), exp(x)] Specic algorithms for trigonometric functions hyperbolic functions

Interval vectors Denition Interval vector (or box) is a Cartesian product of intervals [x] = [x 1 ] [x 2 ]... [x n ] = ([x 1 ], [x 2 ],..., [x n ]) T Width w ([x]) = max 1 i n w ([x i]) Example A box [x] = [x 1 ] [x 2 ] of IR 2 The set of all boxes of R n is denoted by IR n.

Interval vectors Denition Interval vector (or box) is a Cartesian product of intervals [x] = [x 1 ] [x 2 ]... [x n ] = ([x 1 ], [x 2 ],..., [x n ]) T Width w ([x]) = max 1 i n w ([x i]) Example A box [x] = [x 1 ] [x 2 ] of IR 2 The set of all boxes of R n is denoted by IR n.

Interval vectors Denition Interval vector (or box) is a Cartesian product of intervals [x] = [x 1 ] [x 2 ]... [x n ] = ([x 1 ], [x 2 ],..., [x n ]) T Width w ([x]) = max 1 i n w ([x i]) Example A box [x] = [x 1 ] [x 2 ] of IR 2 The set of all boxes of R n is denoted by IR n.

Interval vectors Denition Interval vector (or box) is a Cartesian product of intervals [x] = [x 1 ] [x 2 ]... [x n ] = ([x 1 ], [x 2 ],..., [x n ]) T Width w ([x]) = max 1 i n w ([x i]) Example A box [x] = [x 1 ] [x 2 ] of IR 2 The set of all boxes of R n is denoted by IR n.

Classical operations on vectors trivially extend to interval vectors α [x] = (α [x 1 ])... (α [x n ]) [x] T. [y] = [x 1 ]. [y 1 ] +... + [x n ]. [y n ] [x] + [y] = ([x 1 ] + [y 1 ])... ([x n ] + [y n ]) and interval matrices

Inclusion functions Denition [f] is an inclusion function for f if [x] IR n, f ([x]) [f] ([x]). f may be dened by an algorithm or even by a dierential equation Innitely many inclusion functions for the same function

Inclusion functions Denition [f] is an inclusion function for f if [x] IR n, f ([x]) [f] ([x]). f may be dened by an algorithm or even by a dierential equation Innitely many inclusion functions for the same function

Subpavings Intervals and boxes are not general enough to describe all sets S of interest Motivates the introduction of subpavings Subpaving of [x] = union of nonoverlapping subboxes of [x]

Subpavings Intervals and boxes are not general enough to describe all sets S of interest Motivates the introduction of subpavings Subpaving of [x] = union of nonoverlapping subboxes of [x]

Inner and outer approximations If subpaving S and S are such that S S S then S is bracketed between inner and outer approximations. The distance between S and S gives an indication of the quality of the approximation of S Computation on subpavings allows to approximate computation on compact sets basic ingredient of the basin capture algorithm to be presented

Inner and outer approximations If subpaving S and S are such that S S S then S is bracketed between inner and outer approximations. The distance between S and S gives an indication of the quality of the approximation of S Computation on subpavings allows to approximate computation on compact sets basic ingredient of the basin capture algorithm to be presented

Inner and outer approximations If subpaving S and S are such that S S S then S is bracketed between inner and outer approximations. The distance between S and S gives an indication of the quality of the approximation of S Computation on subpavings allows to approximate computation on compact sets basic ingredient of the basin capture algorithm to be presented

Message Interval Analysis allows guaranteed results to be obtained Considerable advantage over usual numerical methods

Guaranteed numerical integration Basic Tool for capture basin algorithm Interval ow The inclusion function of the ow is a function { IR IR [φ] [t] n IR m IR n : ([x], [u]) [φ] [t] ([x], [u]) such that t [t], x [x], u U, φ t (x, u) [φ] [t] ([x], [u]) Guaranteed numerical integration is based on Picard Theorem and Taylor expansion Software tools are available to compute Guaranteed numerical integration e.g., AWA, COSY or VNODE

Guaranteed numerical integration Basic Tool for capture basin algorithm Interval ow The inclusion function of the ow is a function { IR IR [φ] [t] n IR m IR n : ([x], [u]) [φ] [t] ([x], [u]) such that t [t], x [x], u U, φ t (x, u) [φ] [t] ([x], [u]) Guaranteed numerical integration is based on Picard Theorem and Taylor expansion Software tools are available to compute Guaranteed numerical integration e.g., AWA, COSY or VNODE

Basic Tool for capture basin algorithm Algorithm The capture basin algorithm is based on the following properties (i) [x] T [x] C (ii) [x] K = [x] C = (iii) ([φ] t ([x], u) C [φ] [0,t] ([x], u) K) [x] C (iv) [φ] t ([x], U) C + = [φ] t ([x], U) K = [x] C =

Basic Tool for capture basin algorithm Algorithm The capture basin algorithm is based on the following properties (i) [x] T [x] C (ii) [x] K = [x] C = (iii) ([φ] t ([x], u) C [φ] [0,t] ([x], u) K) [x] C (iv) [φ] t ([x], U) C + = [φ] t ([x], U) K = [x] C =

Basic Tool for capture basin algorithm Algorithm The capture basin algorithm is based on the following properties (i) [x] T [x] C (ii) [x] K = [x] C = (iii) ([φ] t ([x], u) C [φ] [0,t] ([x], u) K) [x] C (iv) [φ] t ([x], U) C + = [φ] t ([x], U) K = [x] C =

Basic Tool for capture basin algorithm Algorithm The capture basin algorithm is based on the following properties (i) [x] T [x] C (ii) [x] K = [x] C = (iii) ([φ] t ([x], u) C [φ] [0,t] ([x], u) K) [x] C (iv) [φ] t ([x], U) C + = [φ] t ([x], U) K = [x] C =

Basic Tool for capture basin algorithm Algorithm The capture basin algorithm is based on the following properties (i) [x] T [x] C (ii) [x] K = [x] C = (iii) ([φ] t ([x], u) C [φ] [0,t] ([x], u) K) [x] C (iv) [φ] t ([x], U) C + = [φ] t ([x], U) K = [x] C =

Basic Tool for capture basin algorithm Algorithm The capture basin algorithm is based on the following properties (i) [x] T [x] C (ii) [x] K = [x] C = (iii) ([φ] t ([x], u) C [φ] [0,t] ([x], u) K) [x] C (iv) [φ] t ([x], U) C + = [φ] t ([x], U) K = [x] C =

Basic Tool for capture basin algorithm Algorithm The capture basin algorithm is based on the following properties (i) [x] T [x] C (ii) [x] K = [x] C = (iii) ([φ] t ([x], u) C [φ] [0,t] ([x], u) K) [x] C (iv) [φ] t ([x], U) C + = [φ] t ([x], U) K = [x] C =

Basic Tool for capture basin algorithm Algorithm The capture basin algorithm is based on the following properties (i) [x] T [x] C (ii) [x] K = [x] C = (iii) ([φ] t ([x], u) C [φ] [0,t] ([x], u) K) [x] C (iv) [φ] t ([x], U) C + = [φ] t ([x], U) K = [x] C =

Basic Tool for capture basin algorithm Algorithm The capture basin algorithm is based on the following properties (i) [x] T [x] C (ii) [x] K = [x] C = (iii) ([φ] t ([x], u) C [φ] [0,t] ([x], u) K) [x] C (iv) [φ] t ([x], U) C + = [φ] t ([x], U) K = [x] C =

Basic Tool for capture basin algorithm Illustration Zermelo navigation problem In control theory, Zermelo has described the problem of a boat which wants to reach an island from the bank of a river with strong currents. The magnitude and direction of the currents are known as a function of position. Let T B (0, r) with r = 1 be the island and we set K = [ 8, 8] [ 4, 4], where K represents the river.

Illustration Basic Tool for capture basin algorithm Zermelo navigation problem Let us consider the following dynamics for the boat { x 1 (t) = v cos(θ) x 2(t) = v sin(θ), where the controls v [0, 0.8] and θ [ π, π]. The currents are represented by an autonomous vector eld, then the global dynamic (boat and currents) is given by x 1(t) = 1 + x2 2 x 2 1 (x 2 1 + + v cos(θ) x2 2 )2 x 2x 1 x. 2 2(t) = (x 2 1 + + v sin(θ) x2 2 )2

Illustration Basic Tool for capture basin algorithm Zermelo navigation problem Let us consider the following dynamics for the boat where the controls v [0, 0.8] and θ [ π, π]. The currents are represented by an autonomous vector eld, then the global dynamic (boat and currents) is given by x 1(t) = 1 + x2 2 x 2 1 (x 2 1 + + v cos(θ) x2 2 )2 x 2x 1 x. 2 2(t) = (x 2 1 + + v sin(θ) x2 2 )2

Illustration Basic Tool for capture basin algorithm Results The gure shows the result of the capture basin algorithm, where the circle delimits the border of the target T ; C corresponds to the union of all red boxes ; C + corresponds to the union of both red and yellow boxes ; nally, C C C +.

Basic Tool for capture basin algorithm Conclusions A new approach to deal with capture basin problems is presented. This approach uses interval analysis to compute an inner an outer approximation of the capture basin for a given target. To ll out this work, dierent perspectives appear. It could be interesting to tackle problems in signicantly larger dimensions. Constraint propagation techniques make it possible to push back this frontier and to deal with high dimensional problems (with more than 1000 variables for instance) We plan to combine our algorithm with graph theory and guaranteed numerical integration to compute a guaranteed control u.

Basic Tool for capture basin algorithm Conclusions A new approach to deal with capture basin problems is presented. This approach uses interval analysis to compute an inner an outer approximation of the capture basin for a given target. To ll out this work, dierent perspectives appear. It could be interesting to tackle problems in signicantly larger dimensions. Constraint propagation techniques make it possible to push back this frontier and to deal with high dimensional problems (with more than 1000 variables for instance) We plan to combine our algorithm with graph theory and guaranteed numerical integration to compute a guaranteed control u.

Basic Tool for capture basin algorithm Conclusions A new approach to deal with capture basin problems is presented. This approach uses interval analysis to compute an inner an outer approximation of the capture basin for a given target. To ll out this work, dierent perspectives appear. It could be interesting to tackle problems in signicantly larger dimensions. Constraint propagation techniques make it possible to push back this frontier and to deal with high dimensional problems (with more than 1000 variables for instance) We plan to combine our algorithm with graph theory and guaranteed numerical integration to compute a guaranteed control u.

Basic Tool for capture basin algorithm Conclusions A new approach to deal with capture basin problems is presented. This approach uses interval analysis to compute an inner an outer approximation of the capture basin for a given target. To ll out this work, dierent perspectives appear. It could be interesting to tackle problems in signicantly larger dimensions. Constraint propagation techniques make it possible to push back this frontier and to deal with high dimensional problems (with more than 1000 variables for instance) We plan to combine our algorithm with graph theory and guaranteed numerical integration to compute a guaranteed control u.

Basic Tool for capture basin algorithm Conclusions A new approach to deal with capture basin problems is presented. This approach uses interval analysis to compute an inner an outer approximation of the capture basin for a given target. To ll out this work, dierent perspectives appear. It could be interesting to tackle problems in signicantly larger dimensions. Constraint propagation techniques make it possible to push back this frontier and to deal with high dimensional problems (with more than 1000 variables for instance) We plan to combine our algorithm with graph theory and guaranteed numerical integration to compute a guaranteed control u.